A vulnerability was found in SourceCodester Simple Online Bidding System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /simple-online-bidding-system/bidding/admin/ajax.php?action=login2. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://github.com/Wsstiger/cve/blob/main/Sourcecoster_sql2.md | Exploit |
| https://vuldb.com/?ctiid.274651 | Permissions Required VDB Entry |
| https://vuldb.com/?id.274651 | Permissions Required Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.390297 | Third Party Advisory VDB Entry |
Configurations
History
19 Aug 2024, 16:42
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/Wsstiger/cve/blob/main/Sourcecoster_sql2.md - Exploit | |
| References | () https://vuldb.com/?ctiid.274651 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.274651 - Permissions Required, Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.390297 - Third Party Advisory, VDB Entry | |
| First Time |
Oretnom23 simple Online Bidding System
Oretnom23 |
|
| CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
| CPE | cpe:2.3:a:oretnom23:simple_online_bidding_system:1.0:*:*:*:*:*:*:* | |
| Summary |
|
15 Aug 2024, 00:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-08-15 00:15
Updated : 2024-08-19 16:42
NVD link : CVE-2024-7798
Mitre link : CVE-2024-7798
CVE.ORG link : CVE-2024-7798
JSON object : View
Products Affected
oretnom23
- simple_online_bidding_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
